|UCSB CRYPTO CONFRENCE - SANTA BARBARIAN|
Keywords: UCSB CRYPTO
|Usenet groups within perl.crypto from giganews.com|
Usenet newsgroups within "perl.crypto", contributed courtesy of giganews.com. These captures omit most binary posts.
|Wiki - Crypto|
Crypto dumped with WikiTeam tools.
Keywords: wiki; wikiteam; MediaWiki; Crypto; editthisinfo_crypto; unknowncopyright
|Freepto Rischio - avana|
Keywords: freepto; crypto; usb
|Installing the I2P darknet software in Linux - Adrian Crenshaw|
Installing the I2P darknet software in Linux
Keywords: privacy; crypto; cipherspace
|crypto.stanford.edu 2012-11-30 panic downlaod - crypto.stanford.edu|
This is a panic download of crypto.stanford.edu as of 2012-11-30. This has lot of pdf papers in it that i think should be archived. It also has lot of big files that are repeated a fews times in it.
Keywords: crypto.stanford.edu; archiveteam
|Usenet groups within alt.sources from giganews.com|
Usenet newsgroups within "alt.sources", contributed courtesy of giganews.com. These captures omit most binary posts.
Keywords: alt.sources.crypto; alt.sources
|Protecting your Facebook privacy at work isn't just about passwords - Cory Doctorow|
Here's a podcast of my last Guardian column, Protecting your Facebook privacy at work isn't just about passwords: Facebook has threatened to sue companies that force their employees to reveal their Facebook login details. As laudable as this is, I worry that it will fail to accomplish its primary objective â protecting Facebook users from employer snooping. Increasingly, firms configure the computers and devices on their internal networks to trust "self-signed certificates"...
Keywords: podcast; audio; crypto; privacy; corydoctorow
|Blood Drop (Coagulated Remix) - mirage, Crypto Bass|
Blood Drop (Coagulated Remix)
Keywords: Blood Drop; Coagulated Remix; mirage; Crypto Bass
|Triton (Retrograde Remix) - mirage, Crypto Bass|
Triton (Retrograde Remix)
Keywords: Triton; Retrograde Remix; mirage; Crypto Bass
|The Counter-Reformation in Stone and Metal: Spiritual Substances - Erik Butler|
Paper given at Black Metal Theory Symposium I: Hideous Gnosis HTTP://BLACKMETALTHEORY.BLOGSPOT.COM
Keywords: black metal; crypto-catholicism; immortal; piteous globe
|Blood Drop (Collagen Remix) - mirage, Crypto Bass|
Blood Drop (Collagen Remix)
Keywords: Blood Drop; Collagen Remix; mirage; Crypto Bass
|Raising User Acceptance of Token-based Authentication by Single Sign-On|
Secure and reliable authentication is one important part in the scope of IT security, but the practical experience shows that adequate authentication mechanisms are often inconvenient for the populace. Password-based mechanisms dominate as they are easy to use and do not need additional hardware. However, lots of users do not realize the threads with respect to password-based mechanisms: many users use passwords for remote authentication over unsecured channels or in not trustworthy environments...
Keywords: authentication; single sign-on; crypto token
|Unforgettable Demure (Blackout Remix) - mirage, Crypto Bass|
Unforgettable Demure (Blackout Remix)
Keywords: Unforgettable Demure; Blackout Remix; mirage; Crypto Bass
|In Re Decryption|
Opinion denying forced decryption on 5th Amendment grounds
Keywords: Hanni Fakhoury; decryption; crypto; Fifth Amendment
|A Stick Figure Guide to the Advanced Encryption Standard (AES) - Jeff Moser|
A stick figure play in 4 acts describing the history and inner workings of the Advanced Encryption Standard (AES). It goes along with a blog post at http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
Keywords: aes; advanced encryption standard; encryption; crypto; cryptography
|Metadata – a wartime drama - Cory Doctorow|
In this week's podcast, I read aloud a recent Guardian column, "Metadata – a wartime drama":http://www.theguardian.com/technology/2013/jul/05/metadata-wartime-drama-privacyWhich imagines a dialog between Alan Turing and Winston Churchill that might have taken place if the UK Home Secretary Theresa May had been Turing's line-manager"All we can tell with this analysis is who is speaking, what equipment they use to speak, whom else they speak to, who the messages are addressed to, the subject of ...
Keywords: podcasts; metadata; spooks; nsa; turing; bletchleypark; crypto
|MSN Crypto Privacy - http://www.hotdispatch.com/view-ip-requester?ID=16709296|
This plug-in for MSN messenger encrypts your messages as you send them across the network.
Keywords: MSN Crypto Privacy; Internet; Communications; Chat messenger add-ons; MSN; MSN Crypto Privacy
|Cryptolog Volume XIV Number 2 - National Security Agency|
Features: Thrust Four (U) Bulletin Board (U) Information Management For The Future (U) Food For Thought (U) Modem Communications (U) by Frederick Rodean Letters (U) The Reckoning (U) Some Tips On Getting Promoted, 3rd ed. (U) Contributions Solicited Getting Started Golden Oldie (U) NSA-Crostic No. 64 (U) How Russians View Their Leaders (U)
Keywords: NSA; Cryptolog; declassified; redacted; personnel; promotion; nsa; crypto; personnel summaries; personnel summary; crypto log; promotion files
|Cryptolog Volume IV Number 11 - National Security Agency|
Features: [Redacted] Objective Satisfaction Score: Collection Director's Memorandum: [Redacted] by Vice Admiral B.R. Inman Cure For Time-In-Grade Syndrome A Little T.A. Problem Backing Into Language Acquisition NSA-Crostic No. 10 by A.J.S. How Many African Countries Can You Spot? Language Processing Forum C.A.A. News What Ever Does "However" Mean? Letters To The Editor
Keywords: NSA; Cryptolog; declassified; redacted; unclassified; crypto; november; log; crypto log; top secret; secret spoke; foreign language
|Top Secret Crypto Gold - http://www.topsecretcrypto.com|
This software includes Top Secret Chat and Top Secret Journal, with file and e-mail encryption. It includes spell checking for e-mail, journal, and chatting and uses RSA Public Key Cryptography with the One Time Pad Encryption System. Conduct an encrypted peer-to-peer secure chat over the Internet. Maintain an encrypted journal or diary. The program supports RSA key sizes 480 to 16,384 bits. Insert up to 60 smileys in e-mail, journal entries, and chat sessions...
Keywords: Top Secret Crypto Gold; System and utilities; File tools; File encryption; Top Secret Crypto Gold
|Cryptolog Volume IV Number 6 - National Security Agency|
Features: Human Factors And Systems Design Old Russian Manuscript Ciphers SIGINT Welcomes Inkstand AG-22/IATS: A View From The Bridge Vich ISS R-r- Right? by A.J.S. Letters To The Editor CLA Announcement: Annual Banquet
Keywords: NSA; Cryptolog; declassified; redacted; secret; linguists; june; crypto; secret spoke; crypto log; english sounds; top secret
|Crypto Pilot - http://www.colorpilot.com/cryptopilot.html|
This is a file-encryption program that protects your files and folders from unauthorized access. Just drag and drop files to protect your data. The program enables you to create encrypted data backup, create a key to your file from a floppy or Flash drive, hide some files from co-workers and family members, send encrypted files, and protect your future plans from competitors.
Keywords: Crypto Pilot; System and utilities; File tools; File encryption; Crypto Pilot
|Cryptolog Volume II Numbers 8 and 9 - National Security Agency|
Features: 20 Years Of Transposition Processing [Redacted] Communications The Voynich Manuscript: Third Theory by Doris Miller Typewriter Random: A New Look A Fix For The Language Problem? by John B. Thomas, Jr. Abdul And His 40 Tanks by Frederic O. Mason, Jr. Linguists -- We Need An "Experts Yellow Pages" Letter To The Editor
Keywords: NSA; Cryptolog; declassified; redacted; secret; umbra; crypto; unclassified; top secret; secret umbra; crypto log; subject matter
|Wait Until Kingdom Come (Osmium Mix) - mirage, Crypto Bass|
Wait Until Kingdom Come (Osmium Mix)
Keywords: Wait Until Kingdom Come; Osmium Mix; mirage; Crypto Bass
|Acerca de un caso de sinfisoceria asociada a una posible cripto-meiomelia de la antena izquierda en Trox cotodognanensis Compte, 1985 (Coleoptera: Trogidae). - Verdugo, A.|
syphysocre in Trox cotodognanensis
Keywords: Symphysocery; possible crypto-meiomelia; Trox cotodognanensis; DoÃ±ana; Spain
|Have You Embraced the Beast (1998) - TK Major|
Originally recorded and posted to the net in 1998 as part of TK Major's Song of the Day Project, this archive recording has been lovingly remastered to bring it more in line with today's squashed, dynamics-free standards (that's a joke, son) and included here for no good reason except because it amused him.
Keywords: greed, hate, beast, death squad, Reagan, Bush, crypto-fascism
|Wait Until Kingdom Come (Iron Mix) - Crypto Bass, mirage|
Wait Until Kingdom Come (Iron Mix)
Keywords: Wait Until Kingdom Come; Iron Mix; Crypto Bass; mirage
|LB #32: The Crypto-Anarchist Manifesto|
An intriguing little publication of sorts I happened to stumble upon. Music courtesy of Badadam's "Drifter."
Keywords: The Crypto-Anarchist Manifesto Badadam Drifter Last Bastille Podcast
|Cryptolog Volume VIII Numbers 1-3 - National Security Agency|
Features: Sigint In The 80s: Two Views (U): I. Robert E. Rich II. William Lutwiniak Kittiwake (U) How To Improve Your Promotion Potential NSA-Crostic No. 32 by D.H.W. Translator In Your Pocket (U) Some Things Never Change (U) NCS-CLA Symposium (U) Why Do They Leave? (U)
Keywords: NSA; Cryptolog; declassified; redacted; language; unclassified; linguists; sigint; crypto; crypto log; top secret; secret handle; career field
|Cryptolog Volume VI Number 10 - National Security Agency|
Features: Snowballs On The Roof (U) by Vera R. Filby Another Source (U) NSA-Crostic No. 29 (U) by DHW The Roads Around Us (U) The 2000- Year-old Transcriber (U) Letter To The Editor (U) Club News (U)
Keywords: NSA; Cryptolog; declassified; redacted; unclassified; nsa; antenna; equipment; crypto; crypto log; cryptologic community; unused property; condition codes
|Cryptolog Volume V Numbers 7 and 8 - National Security Agency|
Features: The Soviet General Staff Has It Ever Been Translated Before? Another Country Trigraph System Is A Translator A Professional? The Bucky Balance Tell Me I'm Just A Sinobibliophobe! NSA-Crostic No. 16 by David H. Williams News Of The Communications Analysis Association I Remember Spellman by A. J. Salemme New Board Members; No More Mispellings [sic] Letters To The Editor by [Redacted] Gurin, [Redacted]
Keywords: NSA; Cryptolog; declassified; redacted; project; translations; translation; nsa; general staff; project starter; armed forces; crypto log
|In Her Own Voice: DoÃ±a Teresa Aguilera y Roche and Intrigue in the Palace of the Governors - New Mexico History Museum, Department of Cultural Affairs|
Dr. Frances Levine's lecture âIn Her Own Voice: DoÃ±a Teresa Aguilera y Roche and Intrigue in the Palace of the Governorsâ. Presented February 20, 2010, as part of the ongoing lecture series accompanying "Santa Fe Found: Fragments of Time: The archaeological and historic roots of Americaâs oldest capital city." New Mexico History Museum Auditorium, Santa Fe, New Mexico.
Keywords: santa fe; new mexico history museum; santa fe found; archaeology; crypto-jews; inquisition; jewish heritage
|Cryptolog Volume VI Number 7 - National Security Agency|
Features: Source Protection: Our Agency's Insurance Policy (U) Naval Readiness: A Basis For Comparison (U) NSA-Crostic No. 27 (U) by D.H.W. Wilt Thou, Angelina? (U) by Sydney Fairbanks Gears Of The Mouth (U) by Donald Lasley Letters To The Editor (U) Expert (U) Shootout At The SIGINT Corral (U)
Keywords: NSA; Cryptolog; declassified; redacted; sigint; unclassified; naval; submarines; crypto log; language quality; quality control; german naval
|Cryptolog Volume V Number 1 - National Security Agency|
Features: Early Proposal For Satellite Remoting by Joseph E. Horn Comint, Comsec, And Hilbert's Tenth The Changing Face Of N.S.A But Why Do We Do It Thanks For The Attaboy! What Ever Happened To Copes? "The Man Who Broke Purple" by P. William Filby A. C. Brown's "Bodyguard Of Lies" NSA-Crostic No. 11 by David H. Williams C.A.A. News Joys And Frustrations Of Plural-Dropping by A.J.S. Letter To The Editor
Keywords: NSA; Cryptolog; declassified; redacted; unclassified; nsa; plural; comsec; crypto log; traffic analysis; top secret; tenth problem
|Cryptolog Volume V Number 11 - National Security Agency|
Features: Wedding Bells And That Old Gang Of Mine by E. Leigh Sawyer A Small Problem NSA Data Standards Center by Mark T. Pattie, Jr. Linguistics And The Code Reconstructor by Stuart H. Buck Dialogue Between Ms. User And Dr. Analysis Cast A Double Shadow: Trojan Horse Of SIGINT Formatting PL/1 Source Code NSA-Crostic No. 19 by David H. Williams Never On My Watch Letters To The Editor by [Redacted], Anon C.A.A...
Keywords: NSA; Cryptolog; declassified; redacted; data; nsa; sigint; unclassified; data standards; crypto log; nsa data; top secret
|Cryptolog Volume VI Number 1 - National Security Agency|
Features: Solis -- A Vehicle In Search Of An Engine How Do You Tell These Two Clowns Apart? The Return To H.F. Second Sighting by Sue Donym Japanese Translation At A.H.S. T-vision: Medium Of The Future Reflections And Recommendations by Vera R. Filby Human Factors Newsletter NSA-Crostic No. 21 by David H. Williams Golden Oldie: On Opening "Statistics" by Marjorie Mountjoy Henry Cement & Phantoms Of Opera(tions) Classification Corner: It's Party Time! Publisher's Message
Keywords: NSA; Cryptolog; declassified; redacted; user; unclassified; warc; translation; reconstruction begun; code book; crypto log; translation published
|Cryptolog Volume V Number 10 - National Security Agency|
Features: Data Security And Human Error Continuing Professionalization Method Of Measuring Negative Intelligence Can't Tell Wheat From Chaff by J. Gurin Reduction Ratios In Micrographics by Don Snow Back To Square One! Feeding The Germans Misinformation by P.W. Filby And-a You Betta Have Moti-vaysh! News Of Communications Analysis Association by W.E.S. More B. S. (before Spellman) Letters To Editor by Pattie, Filby, [Redacted] NSA-Crostic No...
Keywords: NSA; Cryptolog; declassified; redacted; unclassified; professionalization; data; stenotypy; top secret; crypto log; reduction ratio; career field
|Cryptolog Volume V Number 2 - National Security Agency|
Features: Collection-Support T.A. Is Not For Everyone Unseen Go-between: Conference Interpreter by J. Gurin First Lady Of Naval Cryptology C.A.A. News Military Cryptologic Supervisors Course More Beans by Vera Ruth Filby By-lines Don't Cost -- They Pay! by John J. Mollick "No, Winnie, You've Got It Upside-down! " by A.J.S.
Keywords: NSA; Cryptolog; declassified; redacted; unclassified; cryptologic; naval; umbra; top secret; secret umbra; crypto log; umbra february
|Cryptolog Volume V Number 3 - National Security Agency|
Features: Some Background On The C/T Merger by Frank Smith Hand Is Not Quicker Than The Eye A Donkey In Your What? A Linguist Looks At The "Tube" Letters To The Editor An Idea For An Article by Doris E. Miller Word- Seek NSA-Crostic No. 12 by A.J.S. C.L.A. News: C.A.A. News Cure For "Performance Syndrome"
Keywords: NSA; Cryptolog; declassified; redacted; adp; communications; nsa; march; crypto log; top secret; secret spoke; data processing
|CryptoCrat 2004 - http://www.cryptocrat.com/|
This program compresses multiple files into a single, 448-bit encrypted file. It convert data to gibberish, and the original file can only be unscrambled and read by someone who knows the password. The program also supports secure deletion of files from the hard drive. You can create encrypted self-extracting executables to send by e-mail, and the program integrates with the Windows context menu.
Keywords: CryptoCrat 2004; System and utilities; File tools; File encryption; Crypto Crat 2003
|Cryptolog Volume V Number 6 - National Security Agency|
Features: Bookbreakers Forum On Machine Aids Equipment Maintenance On Abner Golden Oldie: Unknown Location Of U/I Unit Never Again! by Jack Gurin Computer Scratch Pad: At Home Or At Work? by Bill Crowell Minnie's Mini by Minnie M. Kenny NSA-Crostic No. 15 by A.J.S. As I Was Saying Two Years Ago by Mark T. Pattie, Jr Celtic Languages Today Letter To The Editor by E.A. Gilbertson C.A.A. News
Keywords: NSA; Cryptolog; declassified; redacted; celtic; gaelic; unclassified; nsa; top secret; crypto log; celtic languages; secret umbra
|Cryptolog Volume VI Number 4 - National Security Agency|
Features: COMSEC/SIGINT Relations (U) by David G. Boak A Somewhat Larger Problem (U) Classic Cables (U) Fear Of Testing... And What To Do About It (U) More Fairbanks On English (U) by Sydney Fairbanks NSA-Crostic No. 24 (U) by D.H.W. Letters To The Editor (U) Bookbreaker's Forum (U) But, Mr. Boak, Did You Ever Try To Get Rid Of One In A Hurry! (U) by D.H.W.
Keywords: NSA; Cryptolog; declassified; redacted; phobia; nsa; unclassified; secret; secret handle; crypto log; going upstairs; second party
The world of Fiat currencies are old, outdated, not enough hard currency moneysupply and mismanaged by its current governments (Currency Wars) and now starting tocause Social unrest, this is only the beginning and trying to get ahead of and prevent thisvery serious situation from getting really out of hand. The world has experienced GlobalFinancial Crisis (2008 -2013), Central Banks disorder = Major Social disorder & unrest...
Keywords: Fiat currencies; Currency Wars; crypto currencies; Central Banks disorder; Social disorder; Global Financial Crisis
|Cryptolog Volume VIII Numbers 4-6 - National Security Agency|
Features: Middle-Age Spread (U) Grading The Russian PQE (U) Third Party Relationships (U) The Poets' Corner (U) NSA-Crostic No. 33 (u) by D.H.W. Classic Cables (U) Traffic Analysis: Specialty Without Portfolio (U) DIA Videocasette Program (U)
Keywords: NSA; Cryptolog; declassified; redacted; grading; pqe; secret; errors; crypto log; top secret; secret spoke; grading system
|Cryptolog Volume X Number 10 - National Security Agency|
Features: Crisis Management: Remarks (U) by Lincoln D. Faurer Soviet Military Goals And Their Effect On Negotiations For Arms Limitations (U) Tips On Topical Reporting (U) Thousands Miss Demonstration (U) Looking Around: Telecom 83 (U) Banners, Cowboy Hats, And ELINT Notations (U)
Keywords: NSA; Cryptolog; declassified; redacted; menwith; military; oct; soviet; menwith hill; task force; crypto log; soviet military
|Cryptolog Volume XIII Number 12 - National Security Agency|
Features: Technology Seepage (U) Who Is She? (U) CRYSCOM (U) Quote Without Comment (U) The Language Identification Problem (U) Product vs Process (U) Changing Jobs (U) Ode To The CA Intern Program (U) A Composite Conversation (U) Book Review [GCHQ: The Secret Wireless War 1900-1986] (U) by Vera Filby Conference Report (U) Letter (U) Opportunity (U) Bulletin Board (U) CISI Conference (U) The Story Of A Private German Cipher (U) NSA-Crostic No...
Keywords: NSA; Cryptolog; declassified; redacted; december; secret; nsa; sigint; spread spectrum; comint channels; crypto log; spreading code
|Cryptolog Volume XIII Numbers 8-9 - National Security Agency|
Features: Something New (U) Rum Runners, 1930 (U) Enter Your Passphrase, Please (U) Extended Hours At Learning Center #1 (U) Collection Management (U) Bulletin Board (U) Senior Professional Career Program (U) Back-up Shells For The ASTW (U) Conference Report (U) Book Reviews: Out Of The Inner Circle (U) ... Secrecy, Authentication , And Public Key Systems (U) ... The Computation Of Style (U) ... Italian For Educated Guessers (U) Letters (U) A Private German Cipher Of WWI (U)
Keywords: NSA; Cryptolog; declassified; redacted; user; collection; password; coast; coast guard; collection management; crypto log; computer security
|Cryptolog Volume XIII Numbers 1-2 - National Security Agency|
Features: What I Perceive To Be Happening In The Pacific (U) Diary Of A Geisha (U) Career Opportunity (U) A Case Of Forensic SIGINT (U) CRYSCOM-86 (U) A Morality Play In One Act (U) A Problem In Retrieval (U) Improving Training In Technical ELINT (U) Bulletin Board (U) Letters (U) Puzzle (U)
Keywords: NSA; Cryptolog; declassified; redacted; elint; product; secret; nsa; red works; crypto log; technical elint; secret spoke
|Cryptolog Volume XIII Numbers 10-11 - National Security Agency|
Features: A New Kind Of Japanese (U) SIREN No. 5 (U) A Summer Language Course (U) On The Lighter Side (U) The Representation Of Prefixes Conference Report (U) by N.C. Gerson Technical Literature Review (U) Software Review (U) Bulletin Board (U) Letters (U) From The Past Results Of Readers' Survey (U) Puzzle (U)
Keywords: NSA; Cryptolog; declassified; redacted; collection; pts; expert; comint; expert system; pts single; personal consultant; crypto log